|
Showing 1 - 3 of
3 matches in All Departments
Identity Based Encryption (IBE) is a type of public key encryption
and has been intensely researched in the past decade.
Identity-Based Encryption summarizes the available research for IBE
and the main ideas that would enable users to pursue further work
in this area. This book will also cover a brief background on
Elliptic Curves and Pairings, security against chosen Cipher text
Attacks, standards and more. Advanced-level students in computer
science and mathematics who specialize in cryptology, and the
general community of researchers in the area of cryptology and data
security will find Identity-Based Encryption a useful book.
Practitioners and engineers who work with real-world IBE schemes
and need a proper understanding of the basic IBE techniques, will
also find this book a valuable asset.
Identity Based Encryption (IBE) is a type of public key encryption
and has been intensely researched in the past decade.
Identity-Based Encryption summarizes the available research for IBE
and the main ideas that would enable users to pursue further work
in this area. This book will also cover a brief background on
Elliptic Curves and Pairings, security against chosen Cipher text
Attacks, standards and more. Advanced-level students in computer
science and mathematics who specialize in cryptology, and the
general community of researchers in the area of cryptology and data
security will find Identity-Based Encryption a useful book.
Practitioners and engineers who work with real-world IBE schemes
and need a proper understanding of the basic IBE techniques, will
also find this book a valuable asset.
This book constitutes the refereed proceedings of the 12th
International Conference on Cryptology in India, INDOCRYPT 2011,
held in Chennai, India, in December 2011. The 22 revised full
papers presented together with the abstracts of 3 invited talks and
3 tutorials were carefully reviewed and selected from 127
submissions. The papers are organized in topical sections on
side-channel attacks, secret-key cryptography, hash functions,
pairings, and protocols.
|
You may like...
Romanticism
Leon Rosenthal
Hardcover
R1,010
Discovery Miles 10 100
|